A Comprehensive Security Architecture for Information Management throughout the Lifecycle of IoT Products
| dc.contributor | Aalto-yliopisto | fi |
| dc.contributor | Aalto University | en |
| dc.contributor.author | Yousefnezhad, Narges | en_US |
| dc.contributor.author | Malhi, Avleen | en_US |
| dc.contributor.author | Keyriläinen, Tuomas | en_US |
| dc.contributor.author | Främling, Kary | en_US |
| dc.contributor.department | Department of Computer Science | en |
| dc.contributor.groupauthor | Främling Kary group | en |
| dc.contributor.groupauthor | Computer Science Adjunct Professors | en |
| dc.date.accessioned | 2023-04-19T06:07:08Z | |
| dc.date.available | 2023-04-19T06:07:08Z | |
| dc.date.issued | 2023-03 | en_US |
| dc.description | Funding Information: The authors thank the support from the Finnish Foundation for Technology and European Union’s Horizon 2020 project FINEST TWINS. Funding Information: This research was funded by the Finnish Foundation for Technology (grant no. 8076) and European Union’s Horizon 2020 project FINEST TWINS (grant no. 856602). | openaire: EC/H2020/856602/EU//FINEST TWINS | |
| dc.description.abstract | The Internet of things (IoT) is expected to have an impact on business and the world at large in a way comparable to the Internet itself. An IoT product is a physical product with an associated virtual counterpart connected to the internet with computational as well as communication capabilities. The possibility to collect information from internet-connected products and sensors gives unprecedented possibilities to improve and optimize product use and maintenance. Virtual counterpart and digital twin (DT) concepts have been proposed as a solution for providing the necessary information management throughout the whole product lifecycle, which we here call product lifecycle information management (PLIM). Security in these systems is imperative due to the multiple ways in which opponents can attack the system during the whole lifecycle of an IoT product. To address this need, the current study proposes a security architecture for the IoT, taking into particular consideration the requirements of PLIM. The security architecture has been designed for the Open Messaging Interface (O-MI) and Open Data Format (O-DF) standards for the IoT and product lifecycle management (PLM) but it is also applicable to other IoT and PLIM architectures. The proposed security architecture is capable of hindering unauthorized access to information and restricts access levels based on user roles and permissions. Based on our findings, the proposed security architecture is the first security model for PLIM to integrate and coordinate the IoT ecosystem, by dividing the security approaches into two domains: user client and product domain. The security architecture has been deployed in smart city use cases in three different European cities, Helsinki, Lyon, and Brussels, to validate the security metrics in the proposed approach. Our analysis shows that the proposed security architecture can easily integrate the security requirements of both clients and products providing solutions for them as demonstrated in the implemented use cases. | en |
| dc.description.version | Peer reviewed | en |
| dc.format.extent | 21 | |
| dc.format.mimetype | application/pdf | en_US |
| dc.identifier.citation | Yousefnezhad, N, Malhi, A, Keyriläinen, T & Främling, K 2023, 'A Comprehensive Security Architecture for Information Management throughout the Lifecycle of IoT Products', Sensors, vol. 23, no. 6, 3236, pp. 1-21. https://doi.org/10.3390/s23063236 | en |
| dc.identifier.doi | 10.3390/s23063236 | en_US |
| dc.identifier.issn | 1424-8220 | |
| dc.identifier.other | PURE UUID: f4a31ffd-ede9-45eb-85b2-042ee254bfa3 | en_US |
| dc.identifier.other | PURE ITEMURL: https://research.aalto.fi/en/publications/f4a31ffd-ede9-45eb-85b2-042ee254bfa3 | en_US |
| dc.identifier.other | PURE FILEURL: https://research.aalto.fi/files/106050757/A_Comprehensive_Security_Architecture_for_Information_Management_throughout_the_Lifecycle_of_IoT_Products_.pdf | |
| dc.identifier.uri | https://aaltodoc.aalto.fi/handle/123456789/120484 | |
| dc.identifier.urn | URN:NBN:fi:aalto-202304192800 | |
| dc.language.iso | en | en |
| dc.publisher | MDPI AG | |
| dc.relation | info:eu-repo/grantAgreement/EC/H2020/856602/EU//FINEST TWINS | en_US |
| dc.relation.fundinginfo | The authors thank the support from the Finnish Foundation for Technology and European Union’s Horizon 2020 project FINEST TWINS. This research was funded by the Finnish Foundation for Technology (grant no. 8076) and European Union’s Horizon 2020 project FINEST TWINS (grant no. 856602). | |
| dc.relation.ispartofseries | Sensors | en |
| dc.relation.ispartofseries | Volume 23, issue 6, pp. 1-21 | en |
| dc.rights | openAccess | en |
| dc.subject.keyword | identity and access management (IAM) | en_US |
| dc.subject.keyword | information management | en_US |
| dc.subject.keyword | Internet of things (IoT) | en_US |
| dc.subject.keyword | product lifecycle information management (PLIM) | en_US |
| dc.subject.keyword | security architecture | en_US |
| dc.title | A Comprehensive Security Architecture for Information Management throughout the Lifecycle of IoT Products | en |
| dc.type | A1 Alkuperäisartikkeli tieteellisessä aikakauslehdessä | fi |
| dc.type.version | publishedVersion |